Up: Surviving Internet Catastrophes
Previous: Acknowledgements
- 1
-
E. G. Barrantes et al.
Randomized instruction set emulation to disrupt binary code injection
attacks.
In Proceedings of the 10th ACM CCS, pages 281-289, Washington
D.C., USA, Oct. 2003.
- 2
-
C. Batten, K. Barr, A. Saraf, and S. Treptin.
pStore: A secure peer-to-peer backup system.
Technical Report MIT-LCS-TM-632, MIT, Dec. 2001.
- 3
-
A. R. Butt, T. A. Johnson, Y. Zheng, and Y. C. Hu.
Kosha: A peer-to-peer enhancement for the network file system.
In Proc. of ACM/IEEE Supercomputing, Pittsburgh, PA, Nov 2004.
- 4
-
M. Castro and B. Liskov.
Practical Byzantine fault tolerance.
In Proc. of the 3rd ACM/USENIX OSDI, pages 173-186, New
Orleans, LA, Feb. 1999.
- 5
-
Y. Chen.
A prototype implementation of archival intermemory.
In Proceedings of the Fourth ACM International Conference on
Digital Libraries, pages 28-37, Berkeley, CA, Aug. 1999.
- 6
-
Codegreen.
https://www.winnetmag.com/Article/ArticleID/22381/22381.html.
- 7
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier,
P. Wagle, Q. Zhang, and H. Hinton.
StackGuard: Automatic adaptive detection and prevention of
buffer-overflow attacks.
In Proceedings of the 7th USENIX Security Conference, pages
63-78, San Antonio, Texas, Jan. 1998.
- 8
-
L. P. Cox and B. D. Noble.
Pastiche: Making backup cheap and easy.
In Proc. of the 5th ACM/USENIX OSDI, pages 285-298, Boston,
MA, Dec. 2002.
- 9
-
CRclean.
https://www.winnetmag.com/Article/ArticleID/22381/22381.html.
- 10
-
H. A. Kim and B. Karp.
Autograph: Toward automated, distributed worm signature detection.
In Proc. of the 13th USENIX Security Symposium, pages 271-286,
Aug. 2004.
- 11
-
A. Haeberlen, A. Mislove, and P. Druschel.
Glacier: Highly durable, decentralized storage despite massive
correlated failures.
In Proc. of NSDI, May 2005.
- 12
-
Insecure.org.
The nmap tool.
https://www.insecure.org/nmap.
- 13
-
F. Junqueira, R. Bhagwan, A. Hevia, K. Marzullo, and G. M. Voelker.
Coping with internet catastrophes.
Technical Report CS2005-0816, UCSD, Feb 2005.
- 14
-
F. Junqueira, R. Bhagwan, K. Marzullo, S. Savage, and G. M. Voelker.
The Phoenix Recovery System: Rebuilding from the ashes of an
Internet catastrophe.
In Proc. of HotOS-IX, pages 73-78, Lihue, HI, May 2003.
- 15
-
F. Junqueira and K. Marzullo.
Synchronous Consensus for dependent process failures.
In Proc. of ICDCS, pages 274-283, Providence, RI, May 2003.
- 16
-
J. O. Kephart and W. C. Arnold.
Automatic extraction of computer virus signatures.
In Proceedings of the 4th Virus Bulletin International
Conference, pages 178-184, Abingdon, England, 1994.
- 17
-
C. Kreibich and J. Crowcroft.
Honeycomb - Creating intrusion detection signatures using
honeypots.
In Proc. of HotNets-II, pages 51-56, Cambridge, MA, Nov.
2003.
- 18
-
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea,
H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao.
Oceanstore: An architecture for global-scale persistent storage.
In Proc. of ACM ASPLOS, pages 190-201, Cambridge, MA, 2000.
- 19
-
J. Levin, R. LaBella, H. Owen, D. Contis, and B. Culver.
The use of honeynets to detect exploited systems across large
enterprise networks.
In Proc. of the IEEE Information Assurance Workshop, pages
92-99, Atlanta, GA, June 2003.
- 20
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard.
A cooperative Internet backup scheme.
In Proc. of USENIX Annual Technical Conference, pages 29-42,
San Antonio, TX, 2003.
- 21
-
T. Liston.
Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea.
Technical report, 2001.
https://www.threenorth.com/LaBrea/LaBrea.txt.
- 22
-
J. W. Lockwood, J. Moscola, M. Kulig, D. Reddick, and T. Brooks.
Internet worm and virus protection in dynamically reconfigurable
hardware.
In Proc. of MAPLD, Sept. 2003.
- 23
-
D. Malkhi and M. Reiter.
Byzantine quorum systems.
In Proc. of ACM STOC, pages 569-578, El Paso, TX, 1997.
- 24
-
Microsoft Corporation.
Microsoft windows update.
https://windowsupdate.microsoft.com.
- 25
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver.
Inside the Slammer worm.
IEEE Privacy & Security, 1(4):33-39, Jul 2003.
- 26
-
D. Moore and C. Shannon.
The spread of the Witty worm.
https://www.caida.org/analysis/security/sitty/.
- 27
-
D. Moore, C. Shannon, and J. Brown.
Code Red: A case study on the spread and victims of an Internet
worm.
In Proc. of ACM IMW, pages 273-284, Marseille, France, Nov.
2002.
- 28
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage.
Internet quarantine: Requirements for containing self-propagating
code.
In Proc. of IEEE Infocom, pages 1901-1910, San Francisco, CA,
Apr. 2003.
- 29
-
D. Moore, G. M. Voelker, and S. Savage.
Inferring Internet denial of service activity.
In Proc. of the USENIX Security Symposium, Washington, D.C.,
Aug. 2001.
- 30
-
Lurhq. mydoom word advisory.
https://www.lurhq.com/mydoomadvisory.html.
- 31
-
A. Rodriguez, C. Killian, S. Bhat, D. Kostic, and A. Vahdat.
Macedon: Methodology for automatically creating, evaluating, and
designing overlay networks.
In Proc. of NSDI, pages 267-280, San Francisco, CA, Mar 2004.
- 32
-
A. I. T. Rowstron and P. Druschel.
Pastry: Scalable, decentralized object location, and routing for
large-scale peer-to-peer systems.
In Proc. of ACM Middleware, pages 329-350, Heidelberg,
Germany, Nov. 2001.
- 33
-
S. Sidiroglou and A. D. Keromytis.
A network worm vaccine architecture.
In Proc. of IEEE Workshop on Enterprise Security, pages
220-225, Linz, Austria, June 2003.
- 34
-
S. Singh, C. Estan, G. Varghese, and S. Savage.
Automated Worm Fingerprinting.
In Proc. of the 6th ACM/USENIX OSDI, pages 45-60, San
Francisco, CA, Dec. 2004.
- 35
-
Lurhq. sobig.a and the spam you received today.
https://www.lurhq.com/sobig.html.
- 36
-
Sophos anti-virus.
W32/sasser-a worm analysis.
https://www.sophos.com/virusinfo/analyses/w32sassera.html, May
2004.
- 37
-
S. Staniford.
Containment of Scanning Worms in Enterprise Networks.
Journal of Computer Security, 2004.
- 38
-
Symantec.
Symantec Security Response.
https://securityresponse.symantec.com/.
- 39
-
T. Toth and C. Kruegel.
Connection-history Based Anomaly Detection.
Technical Report TUV-1841-2002-34, Technical University of Vienna,
June 2002.
- 40
-
J. Twycross and M. M. Williamson.
Implementing and testing a virus throttle.
In Proc. of the 12th USENIX Security Symposium, pages
285-294, Washington, D.C., Aug. 2003.
- 41
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken.
A First step towards automated detection of buffer overrun
vulnerabilities.
In Proc. of NDSS, pages 3-17, San Diego, CA, Feb. 2000.
- 42
-
H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier.
Shield: Vulnerability-driven network filters for preventing known
vulnerability exploits.
In Proc. of ACM SIGCOMM, pages 193- 204, Portland, Oregon,
Aug. 2004.
- 43
-
H. Weatherspoon, T. Moscovitz, and J. Kubiatowicz.
Introspective failure analysis: Avoiding correlated failures in
peer-to-peer systems.
In Proc. of International Workshop on Reliable Peer-to-Peer
Distributed Systems, Oct. 2002.
- 44
-
M. Williamson.
Throttling Viruses: Restricting propagation to defeat malicious
mobile code.
Technical Report HPL-2002-172, HP Laboratories Bristol, June 2002.
- 45
-
C. Wong et al.
Dynamic quarantine of Internet worms.
In Proc. of DSN, pages 73-82, Florence, Italy, June 2004.
- 46
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley.
Monitoring and early warning for Internet worms.
In Proceedings of the 10th ACM CCS, pages 190-199, Washington
D.C., USA, Oct. 2003.
Flavio Junqueira
2005-02-17